Why are our traditional email and endpoint security tools failing us? First, most email deployments lack any authentication of outside senders. Given this vulnerability, it’s trivial to execute spoofing and falsified email content that purports to come from a trusted entity the recipient knows and trusts. Second, attackers are using cloud-based email and “detection-busting” techniques such as fake identities, deceptive sender names and phony domains to beat defenses.

To read full article: http://www.itsecuritynews.info/how-to-conquer-targeted-email-threats-sans-review-of-agari-enterprise-protect-2/